The ad-hoc methodology that is prevalent in today’s
testing and evaluation of network intrusion detection algorithms
and systems makes it difficult to compare different algorithms
and approaches. After conducting a ...